|
|
[ Message Precedent sur la mailing][ Message Suivant sur la mailing][ Precedent dans le fil][ Prochain dans le fil][ Index par Date][ Index par fil]
[SA32573] Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability
Do you need accurate and reliable IDS / IPS / AV detection rules?
Get in-depth vulnerability details:
link://[click]
TITLE:
Cisco IOS / CatOS VLAN Trunking Protocol Vulnerability
SECUNIA ADVISORY ID:
SA32573
VERIFY ADVISORY:
link://[click]
CRITICAL:
Less critical
IMPACT:
DoS
WHERE:
From local network
OPERATING SYSTEM:
Cisco Catalyst 6500 Series 12.x
link://[click]
Cisco CATOS 5.x
link://[click]
Cisco CATOS 6.x
link://[click]
Cisco CATOS 7.x
link://[click]
Cisco CATOS 8.x
link://[click]
Cisco IOS 10.x
link://[click]
Cisco IOS 11.x
link://[click]
Cisco IOS 12.x
link://[click]
Cisco IOS R11.x
link://[click]
Cisco IOS R12.x
link://[click]
Cisco IOS XR 3.x
link://[click]
DESCRIPTION:
A vulnerability has been reported in Cisco IOS/CatOS, which can be
exploited by malicious people to cause a DoS (Denial of Service).
The vulnerability is caused due to an unspecified error in the
handling of VLAN Trunking Protocol (VTP) packets. This can be
exploited to crash an affected device by sending a specially crafted
packet to a switch interface configured to operate as a trunk port.
Successful exploitation requires that "VTP Operating Mode" is set to
"server" or "client".
The vulnerability is reported in Cisco IOS, CatOS, and Cisco IOS with
Ethernet Switch Modules for Cisco 1800/2600/2800/3600/3700/3800 Series
Routers.
SOLUTION:
Apply configuration best practices to limit exposure to exploitation
(please see the vendor advisory for details).
PROVIDED AND/OR DISCOVERED BY:
The vendor credits showrun.lee.
ORIGINAL ADVISORY:
Cisco:
link://[click]
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
link://[click]
Definitions: (Criticality, Where etc.)
link://[click]
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
Archives de la liste de diffusion Secunia
Archives de la liste de diffusion Full Disclosure
| Mini-Tagwall des articles publiés sur SecuObs : | | | | sécurité, exploit, windows, attaque, outil, microsoft, réseau, audit, metasploit, vulnérabilité, système, virus, internet, usbsploit, données, source, linux, protocol, présentation, scanne, réseaux, scanner, bluetooth, conférence, reverse, shell, meterpreter, vista, rootkit, détection, mobile, security, malicieux, engineering, téléphone, paquet, trames, https, noyau, utilisant, intel, wishmaster, google, sysun, libre |
| Mini-Tagwall de l'annuaire video : | | | | curit, security, biomet, metasploit, biometric, cking, password, windows, botnet, defcon, tutorial, crypt, xploit, exploit, lockpicking, linux, attack, wireshark, vmware, rootkit, conference, network, shmoocon, backtrack, virus, conficker, elcom, etter, elcomsoft, server, meterpreter, openvpn, ettercap, openbs, iphone, shell, openbsd, iptables, securitytube, deepsec, source, office, systm, openssh, radio |
| Mini-Tagwall des articles de la revue de presse : | | | | security, microsoft, windows, hacker, attack, network, vulnerability, google, exploit, malware, internet, remote, iphone, server, inject, patch, apple, twitter, mobile, virus, ebook, facebook, vulnérabilité, crypt, source, linux, password, intel, research, virtual, phish, access, tutorial, trojan, social, privacy, firefox, adobe, overflow, office, cisco, conficker, botnet, pirate, sécurité |
| Mini-Tagwall des Tweets de la revue Twitter : | | | | security, linux, botnet, attack, metasploit, cisco, defcon, phish, exploit, google, inject, server, firewall, network, twitter, vmware, windows, microsoft, compliance, vulnerability, python, engineering, source, kernel, crypt, social, overflow, nessus, crack, hacker, virus, iphone, patch, virtual, javascript, malware, conficker, pentest, research, email, password, adobe, apache, proxy, backtrack |
|
|
|
|
|